1 option
Cryptographic Hardware and Embedded Systems -- CHES 2012 : 14th International Workshop, Leuven, Belgium, September 9-12, 2012, Proceedings / edited by Emmanuel Prouff, Patrick R. Schaumont.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 7428.
- Security and Cryptology ; 7428
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Coding theory.
- Information theory.
- Data structures (Computer science).
- Computer security.
- Algorithms.
- Computer science--Mathematics.
- Computer science.
- Cryptology.
- Coding and Information Theory.
- Data Structures and Information Theory.
- Systems and Data Security.
- Algorithm Analysis and Problem Complexity.
- Discrete Mathematics in Computer Science.
- Local Subjects:
- Cryptology.
- Coding and Information Theory.
- Data Structures and Information Theory.
- Systems and Data Security.
- Algorithm Analysis and Problem Complexity.
- Discrete Mathematics in Computer Science.
- Physical Description:
- 1 online resource (XVII, 562 pages) : 189 illustrations.
- Edition:
- First edition 2012.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
- System Details:
- text file PDF
- Summary:
- This book constitutes the proceedings of the 14th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2012, held in Leuven, Belgium, in September 2012. The 32 papers presented together with 1 invited talk were carefully reviewed and selected from 120 submissions. The papers are organized in the following topical sections: intrusive attacks and countermeasures; masking; improved fault attacks and side channel analysis; leakage resiliency and security analysis; physically unclonable functions; efficient implementations; lightweight cryptography; we still love RSA; and hardware implementations.
- Contents:
- Intrusive Attacks and Countermeasures
- Masking
- Improved Fault Attacks and Side Channel Analysis
- Leakage Resiliency and Security Analysis
- Physically Unclonable Functions
- Efficient Implementations
- Lightweight Cryptography
- We Still Love RSA
- Hardware Implementations.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-642-33027-8
- 9783642330278
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.